Contact Us Today 01642 716680


Cybercrime’s Impact on Business

Impact of Cybercrime

While internet security may not be a top priority when starting a business, ignoring potential risks can be disastrous. One of the mistakes executives and managers make is assuming their company is less vulnerable to cyber-attacks than larger corporations. Small businesses, on the other hand, have an equal probability of becoming victims of cybercrime. The most frequent cause for this is that SMEs may lack the resources that larger corporations do. This leaves them more susceptible to cyberattacks and less likely to survive a successful attack.

Mobile App Penetration Testing Methodology

Mobile App Penetration Testing Methodology

Mobile Application Penetration Testing often has a different flow to web application or network testing. This is because not only do you get an application but you also get the software itself. This runs on a device you control and allows for a much wider attack surface. It also allows DE compilation of code and hooking of calls all in service of attacking the application. As such, mobile app pentesting requires an entirely different skill set, knowledge base and methodology. Most mobile application penetration tests rely on the OWASP-MASVS (Mobile Application Security Verification Standard). Senior application developers and hackers are responsible for developing this to ensure that applications meet minimum security requirements. The content in this blog comes from the OWASP-MSTG  which is one of the most complete methodologies available. 

Are Wireless Networks Secure?

Wireless networks are generally a weaker alternative to a hardwire connections. Why is this? Well, if the wireless network’s traffic is open, then anyone within range can gain access which means it’s vulnerable to a ‘sniffing attack’. Modern wireless networks get around this by using encryption that requires a secret key.  How are wireless networks … Read more